Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jMjUyLXhjOHYtbXFtbc4AAQZi
MAGMI plugin for Magento Server Directory Traversal
Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
Permalink: https://github.com/advisories/GHSA-c252-xc8v-mqmmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jMjUyLXhjOHYtbXFtbc4AAQZi
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 5 months ago
Identifiers: GHSA-c252-xc8v-mqmm, CVE-2015-2067
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-2067
- http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html
- http://www.exploit-db.com/exploits/35996
- https://web.archive.org/web/20210122162452/http://www.securityfocus.com/bid/74881
- https://github.com/advisories/GHSA-c252-xc8v-mqmm
Affected Packages
packagist:dweeves/magmi
Dependent packages: 0Dependent repositories: 4
Downloads: 5,365 total
Affected Version Ranges: <= 0.7.21
No known fixed version
All affected versions: 0.7.19, 0.7.20, 0.7.21